Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity Enterprise ServicesSecurity Leadership and ManagementLogical SecuritySecurity & Business ResilienceSecurity Education & TrainingCybersecurity News

Why insider threats pose unique risks to national security

By Marc Packler
insider-threats-freepik1170x658v.jpg

Image by monsterstudio via Freepik

June 29, 2022

Insiders have always posed a unique threat to national security. From Benedict Arnold’s treacherous turn to Robert Hanson’s dramatic betrayal, America’s own have caused grievous damage to the nation. The evolution of the internet, the relative ease of transferring data and the ability to send/receive anonymous money transfers have opened new holes in America’s defenses, dramatically increasing the risk of insider attacks. America needs to adapt current policies to combat the growing insider threat to critical networks.

The modern internet has become socialized. Online social networking is changing the way people view their relationships. Sites like TikTok, Facebook, LinkedIn, Nextdoor and Twitter allow individuals to escape into a virtual world. For some, online relationships become more important than physical ones and virtual personas become more significant than reality. Online communication allows people around the globe to interact and bond in a new way, creating friendships and forming alliances. For example, TikTok, a popular video platform where users create short videos for likes and interactions, boasts over 1 billion monthly active users. Due to the anonymity that a person can assume, these hidden relationships could be easily exploited to provide incentives for insiders to attack network systems and exfiltrate data including that which is essential to our national defense. Additionally, in a world where people live online as much as they do in the physical world, allegiance to a country, company, political affiliation or cause may diminish over time due to the pressure and influences they see on a daily basis based on their multiple social networking feeds.                               

Virtual worlds, with their own systems of law and working economies, provide new means to reward insiders willing to pass sensitive information. In 2021, Metaverse’s revenue was over $117 billion. That’s more than the annual GDP of the state of Arkansas. With currency exchange and facilitated peer-to-peer transactions, the anonymous aspects of virtual gaming dramatically multiply the possibilities for anyone seeking to covertly transfer money. It is easier today for insiders to transfer large amounts of information than ever before. The data tools available to insiders are incredibly widespread and have all sorts of completely legal and legitimate uses for everyday life. Exchanging information through Direct Messages (DMs) or in virtual worlds is now commonplace. This presents a huge problem — it is difficult to determine what information is being transmitted, and there are very few methods to monitor or control the communications flowing through these environments.

Although the government is already working hard to protect its networks from outsiders, as seen in the Insider Threat bill passed by the House in 2015, it is essential to realize the scope of the insider threat. Insiders can cause extensive damage to national security and are difficult to detect because, by nature, they have trusted access to vital information. We must update and adapt current practices to prevent at-risk applicants from gaining access to vital information and limit the possibility of current employees attacking the system.

Most routine security background checks today do not take into account an individual’s extensive cyber activity. Most applicants would not even think to list online screen names as aliases or online friends as personal references. However, a person may have more friends in an online neighborhood than they have in their own local community. Contact with foreign nationals, another part of the background check process, is also less clear with regards to online conversations. There is no easy way to tell if you’re conversing with a person across the street or halfway around the world. Investigators will also need the right tools and authority to follow up and validate cyber information within the background process. It is vitally important to update the background check process to sufficiently include both the physical and virtual worlds.

Developing new technology and radically changing policies is not the best way to defend current vulnerabilities. Policies and procedures need to be carefully tweaked and strongly implemented. Administrators and security need to utilize the tools currently employed to monitor the health of the network and ensure access only to areas required for work. Improved awareness through training and exercises will allow for better preparation of security and network managers to counter evolving vulnerabilities. Proper personnel oversight is key to any successful threat-prevention program. Since technology can’t identify which employees are potential insider threats, supervisors must take an active interest in the lives of their subordinates. Historically, common characteristics of insiders are those with a drastic downturn in their life, such as financial, work or family issues. Interpersonal signals are the best indicators of a potential insider threat, which technology cannot detect.

The cyber environment is changing society in ways that have a significant impact on national security. Even events such as elections pose a strong chance for the possibility of insider threats. Increased online activity presents both new reasons and easier means to betray one’s country or employer. The U.S. government and companies must adapt to actively defend and thwart the evolving insider threat.

KEYWORDS: background check cyber security risk management social media threat management

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Marc packler

Pioneering, innovative, highly accomplished, and decorated, Marc Packler leverages an immense and diverse skillset – derived over the course of his 25+ year career in the United States Air Force – to positively impact digital security, digital transformation, risk management, and strategic operations within organizations across a vast array of industries. Marc is a widely acknowledged subject matter expert and public speaker on matters of digital protection and risk management. Marc can be reached on the Silent Quadrant website, LinkedIn or email marc@silentquadrant.com. 

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Cybersecurity
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Logical Security
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Technologies & Solutions
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Pills spilled

More than 20,000 sensitive medical records exposed

Laptop in darkness

Verizon 2025 Data Breach Investigations Report shows rise in cyberattacks

Coding on screen

Research reveals mass scanning and exploitation campaigns

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Computer with binary code hovering nearby

Cyberattacks Targeting US Increased by 136%

2025 Security Benchmark banner

Events

September 29, 2025

Global Security Exchange (GSX)

 

November 17, 2025

SECURITY 500 Conference

This event is designed to provide security executives, government officials and leaders of industry with vital information on how to elevate their programs while allowing attendees to share their strategies and solutions with other security industry executives.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Security burnout

    Burnout can lead to security threats, insider risk

    See More
  • Avoid insider threats with behavioral analysis

    To avoid insider threats, security strategies call for behavioral profiling and anomaly comparison

    See More
  • hacker

    Insider Threats are Biggest Danger to Data Security

    See More
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing